Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
tSftorqHTy.exe

Overview

General Information

Sample name:tSftorqHTy.exe
renamed because original name is a hash value
Original sample name:2bbb422d5c12723784ee8139173b72ebf1ee0b88ba45b7e6c08265e53dc2fb14.exe
Analysis ID:1632313
MD5:c2792411f364989ec0d213a3ab7c4f94
SHA1:ea0aa28c567ba49407fe84f2df04d232ac7b9147
SHA256:2bbb422d5c12723784ee8139173b72ebf1ee0b88ba45b7e6c08265e53dc2fb14
Tags:exeMassLoggeruser-adrian__luca
Infos:

Detection

MSIL Logger, MassLogger RAT
Score:100
Range:0 - 100
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected MSIL Logger
Yara detected MassLogger RAT
Yara detected Telegram RAT
.NET source code references suspicious native API functions
Contains functionality to log keystrokes (.Net Source)
Joe Sandbox ML detected suspicious sample
Maps a DLL or memory area into another process
Switches to a custom stack to bypass stack traces
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evasive API chain (date check)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Suspicious Outbound SMTP Connections
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses SMTP (mail sending)
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • tSftorqHTy.exe (PID: 3036 cmdline: "C:\Users\user\Desktop\tSftorqHTy.exe" MD5: C2792411F364989EC0D213A3AB7C4F94)
    • RegSvcs.exe (PID: 6584 cmdline: "C:\Users\user\Desktop\tSftorqHTy.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • cleanup
{"EXfil Mode": "SMTP", "From": "securityz@grupomaya.mx", "Password": "    54460hetteXzeLJ  Z+l!UyU_nadu     \u2605\u0b9c\u0b9c", "Server": "mail.grupomaya.mx", "Port": 587}
SourceRuleDescriptionAuthorStrings
00000002.00000002.2594091779.0000000000402000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_MassLoggerYara detected MassLogger RATJoe Security
    00000002.00000002.2594091779.0000000000402000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000002.00000002.2594091779.0000000000402000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_MSILLoggerYara detected MSIL LoggerJoe Security
        00000002.00000002.2594091779.0000000000402000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
          00000002.00000002.2594091779.0000000000402000.00000040.80000000.00040000.00000000.sdmpWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
          • 0xefb7:$a1: get_encryptedPassword
          • 0xf2df:$a2: get_encryptedUsername
          • 0xed52:$a3: get_timePasswordChanged
          • 0xee73:$a4: get_passwordField
          • 0xefcd:$a5: set_encryptedPassword
          • 0x10929:$a7: get_logins
          • 0x105da:$a8: GetOutlookPasswords
          • 0x103cc:$a9: StartKeylogger
          • 0x10879:$a10: KeyLoggerEventArgs
          • 0x10429:$a11: KeyLoggerEventArgsEventHandler
          Click to see the 18 entries
          SourceRuleDescriptionAuthorStrings
          0.2.tSftorqHTy.exe.aa0000.1.unpackJoeSecurity_MassLoggerYara detected MassLogger RATJoe Security
            0.2.tSftorqHTy.exe.aa0000.1.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              0.2.tSftorqHTy.exe.aa0000.1.unpackJoeSecurity_MSILLoggerYara detected MSIL LoggerJoe Security
                0.2.tSftorqHTy.exe.aa0000.1.unpackJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
                  0.2.tSftorqHTy.exe.aa0000.1.unpackWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
                  • 0xd3b7:$a1: get_encryptedPassword
                  • 0xd6df:$a2: get_encryptedUsername
                  • 0xd152:$a3: get_timePasswordChanged
                  • 0xd273:$a4: get_passwordField
                  • 0xd3cd:$a5: set_encryptedPassword
                  • 0xed29:$a7: get_logins
                  • 0xe9da:$a8: GetOutlookPasswords
                  • 0xe7cc:$a9: StartKeylogger
                  • 0xec79:$a10: KeyLoggerEventArgs
                  • 0xe829:$a11: KeyLoggerEventArgsEventHandler
                  Click to see the 13 entries

                  System Summary

                  barindex
                  Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 198.59.144.139, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, Initiated: true, ProcessId: 6584, Protocol: tcp, SourceIp: 192.168.2.5, SourceIsIpv6: false, SourcePort: 49697
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2025-03-07T22:13:48.432256+010028032742Potentially Bad Traffic192.168.2.549695132.226.247.7380TCP
                  2025-03-07T22:13:57.604075+010028032742Potentially Bad Traffic192.168.2.549695132.226.247.7380TCP

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: tSftorqHTy.exeAvira: detected
                  Source: 2.2.RegSvcs.exe.400000.0.unpackMalware Configuration Extractor: MassLogger {"EXfil Mode": "SMTP", "From": "securityz@grupomaya.mx", "Password": " 54460hetteXzeLJ Z+l!UyU_nadu \u2605\u0b9c\u0b9c", "Server": "mail.grupomaya.mx", "Port": 587}
                  Source: tSftorqHTy.exeVirustotal: Detection: 61%Perma Link
                  Source: tSftorqHTy.exeReversingLabs: Detection: 60%
                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability

                  Location Tracking

                  barindex
                  Source: unknownDNS query: name: reallyfreegeoip.org
                  Source: tSftorqHTy.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                  Source: unknownHTTPS traffic detected: 104.21.16.1:443 -> 192.168.2.5:49696 version: TLS 1.0
                  Source: Binary string: wntdll.pdbUGP source: tSftorqHTy.exe, 00000000.00000003.1372543016.0000000003ED0000.00000004.00001000.00020000.00000000.sdmp, tSftorqHTy.exe, 00000000.00000003.1373283962.0000000004070000.00000004.00001000.00020000.00000000.sdmp
                  Source: Binary string: wntdll.pdb source: tSftorqHTy.exe, 00000000.00000003.1372543016.0000000003ED0000.00000004.00001000.00020000.00000000.sdmp, tSftorqHTy.exe, 00000000.00000003.1373283962.0000000004070000.00000004.00001000.00020000.00000000.sdmp
                  Source: C:\Users\user\Desktop\tSftorqHTy.exeCode function: 0_2_004339B6 GetFileAttributesW,FindFirstFileW,FindClose,0_2_004339B6
                  Source: C:\Users\user\Desktop\tSftorqHTy.exeCode function: 0_2_00452492 FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00452492
                  Source: C:\Users\user\Desktop\tSftorqHTy.exeCode function: 0_2_00442886 FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00442886
                  Source: C:\Users\user\Desktop\tSftorqHTy.exeCode function: 0_2_004788BD FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_004788BD
                  Source: C:\Users\user\Desktop\tSftorqHTy.exeCode function: 0_2_0045CAFA FindFirstFileW,FindNextFileW,FindClose,0_2_0045CAFA
                  Source: C:\Users\user\Desktop\tSftorqHTy.exeCode function: 0_2_00431A86 FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00431A86
                  Source: C:\Users\user\Desktop\tSftorqHTy.exeCode function: 0_2_0044BD27 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose,0_2_0044BD27
                  Source: C:\Users\user\Desktop\tSftorqHTy.exeCode function: 0_2_0045DE8F FindFirstFileW,FindClose,0_2_0045DE8F
                  Source: C:\Users\user\Desktop\tSftorqHTy.exeCode function: 0_2_0044BF8B _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0044BF8B
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 01099731h2_2_01099480
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 01099E5Ah2_2_01099A40
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 01099E5Ah2_2_01099A30
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 01099E5Ah2_2_01099D87
                  Source: global trafficTCP traffic: 192.168.2.5:49697 -> 198.59.144.139:587
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: Joe Sandbox ViewIP Address: 104.21.16.1 104.21.16.1
                  Source: Joe Sandbox ViewIP Address: 104.21.16.1 104.21.16.1
                  Source: Joe Sandbox ViewIP Address: 198.59.144.139 198.59.144.139
                  Source: Joe Sandbox ViewIP Address: 132.226.247.73 132.226.247.73
                  Source: Joe Sandbox ViewASN Name: HYPEENT-SJUS HYPEENT-SJUS
                  Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
                  Source: unknownDNS query: name: checkip.dyndns.org
                  Source: unknownDNS query: name: reallyfreegeoip.org
                  Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49695 -> 132.226.247.73:80
                  Source: global trafficTCP traffic: 192.168.2.5:49697 -> 198.59.144.139:587
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                  Source: unknownHTTPS traffic detected: 104.21.16.1:443 -> 192.168.2.5:49696 version: TLS 1.0
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: C:\Users\user\Desktop\tSftorqHTy.exeCode function: 0_2_004422FE InternetQueryDataAvailable,InternetReadFile,0_2_004422FE
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                  Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
                  Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
                  Source: global trafficDNS traffic detected: DNS query: mail.grupomaya.mx
                  Source: RegSvcs.exe, 00000002.00000002.2595080414.0000000002BF0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
                  Source: RegSvcs.exe, 00000002.00000002.2595080414.0000000002BF0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.comd
                  Source: RegSvcs.exe, 00000002.00000002.2595080414.0000000002BF0000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2595080414.0000000002CC6000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2595080414.0000000002BDE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
                  Source: RegSvcs.exe, 00000002.00000002.2595080414.0000000002B71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
                  Source: RegSvcs.exe, 00000002.00000002.2595080414.0000000002BF0000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2595080414.0000000002CC6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/d
                  Source: tSftorqHTy.exe, 00000000.00000002.1375265324.0000000000AA0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2594091779.0000000000402000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
                  Source: RegSvcs.exe, 00000002.00000002.2595080414.0000000002BF0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.orgd
                  Source: RegSvcs.exe, 00000002.00000002.2595080414.0000000002CC6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://grupomaya.mx
                  Source: RegSvcs.exe, 00000002.00000002.2595080414.0000000002CC6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://grupomaya.mxd
                  Source: RegSvcs.exe, 00000002.00000002.2595080414.0000000002CC6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail.grupomaya.mx
                  Source: RegSvcs.exe, 00000002.00000002.2595080414.0000000002CC6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail.grupomaya.mxd
                  Source: RegSvcs.exe, 00000002.00000002.2596505211.000000000603F000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2594241259.0000000000DFA000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2595080414.0000000002CC6000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2596505211.0000000006000000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://r10.i.lencr.org/0
                  Source: RegSvcs.exe, 00000002.00000002.2596505211.000000000603F000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2594241259.0000000000DFA000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2595080414.0000000002CC6000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2596505211.0000000006000000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://r10.o.lencr.org0#
                  Source: RegSvcs.exe, 00000002.00000002.2595080414.0000000002C0D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.org
                  Source: RegSvcs.exe, 00000002.00000002.2595080414.0000000002C0D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.orgd
                  Source: RegSvcs.exe, 00000002.00000002.2595080414.0000000002B71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                  Source: RegSvcs.exe, 00000002.00000002.2596505211.000000000603F000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2594241259.0000000000DFA000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2595080414.0000000002CC6000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2596505211.0000000006000000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/0
                  Source: RegSvcs.exe, 00000002.00000002.2596505211.000000000603F000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2594241259.0000000000DFA000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2595080414.0000000002CC6000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2596505211.0000000006000000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/0
                  Source: RegSvcs.exe, 00000002.00000002.2595080414.0000000002CC6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot
                  Source: tSftorqHTy.exe, 00000000.00000002.1375265324.0000000000AA0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2594091779.0000000000402000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot-/sendDocument?chat_id=
                  Source: RegSvcs.exe, 00000002.00000002.2595080414.0000000002BF0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
                  Source: tSftorqHTy.exe, 00000000.00000002.1375265324.0000000000AA0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2594091779.0000000000402000.00000040.80000000.00040000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2595080414.0000000002BF0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
                  Source: RegSvcs.exe, 00000002.00000002.2595080414.0000000002BF0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189d
                  Source: RegSvcs.exe, 00000002.00000002.2595080414.0000000002BF0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189l
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49696
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49696 -> 443

                  Key, Mouse, Clipboard, Microphone and Screen Capturing

                  barindex
                  Source: 0.2.tSftorqHTy.exe.aa0000.1.raw.unpack, UltraSpeed.cs.Net Code: VKCodeToUnicode
                  Source: C:\Users\user\Desktop\tSftorqHTy.exeCode function: 0_2_0045A10F OpenClipboard,EmptyClipboard,CloseClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_0045A10F
                  Source: C:\Users\user\Desktop\tSftorqHTy.exeCode function: 0_2_0045A10F OpenClipboard,EmptyClipboard,CloseClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_0045A10F
                  Source: C:\Users\user\Desktop\tSftorqHTy.exeCode function: 0_2_0046DC80 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,0_2_0046DC80
                  Source: C:\Users\user\Desktop\tSftorqHTy.exeCode function: 0_2_0044C37A GetKeyboardState,SetKeyboardState,PostMessageW,PostMessageW,SendInput,0_2_0044C37A
                  Source: C:\Users\user\Desktop\tSftorqHTy.exeCode function: 0_2_0047C81C SendMessageW,DefDlgProcW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,GetWindowLongW,SendMessageW,SendMessageW,SendMessageW,_wcsncpy,SendMessageW,SendMessageW,SendMessageW,InvalidateRect,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_0047C81C

                  System Summary

                  barindex
                  Source: 0.2.tSftorqHTy.exe.aa0000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 0.2.tSftorqHTy.exe.aa0000.1.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 0.2.tSftorqHTy.exe.aa0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 0.2.tSftorqHTy.exe.aa0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 00000002.00000002.2594091779.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 00000000.00000002.1375265324.0000000000AA0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 00000000.00000002.1375265324.0000000000AA0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: Process Memory Space: tSftorqHTy.exe PID: 3036, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: Process Memory Space: RegSvcs.exe PID: 6584, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: C:\Users\user\Desktop\tSftorqHTy.exeCode function: 0_2_00431BE8: GetFullPathNameW,__swprintf,_wcslen,CreateDirectoryW,CreateFileW,_wcsncpy,DeviceIoControl,CloseHandle,RemoveDirectoryW,CloseHandle,0_2_00431BE8
                  Source: C:\Users\user\Desktop\tSftorqHTy.exeCode function: 0_2_00446313 DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,_wcsncpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00446313
                  Source: C:\Users\user\Desktop\tSftorqHTy.exeCode function: 0_2_004333BE GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState,0_2_004333BE
                  Source: C:\Users\user\Desktop\tSftorqHTy.exeCode function: 0_2_004096A00_2_004096A0
                  Source: C:\Users\user\Desktop\tSftorqHTy.exeCode function: 0_2_0042200C0_2_0042200C
                  Source: C:\Users\user\Desktop\tSftorqHTy.exeCode function: 0_2_0041A2170_2_0041A217
                  Source: C:\Users\user\Desktop\tSftorqHTy.exeCode function: 0_2_004122160_2_00412216
                  Source: C:\Users\user\Desktop\tSftorqHTy.exeCode function: 0_2_0042435D0_2_0042435D
                  Source: C:\Users\user\Desktop\tSftorqHTy.exeCode function: 0_2_004033C00_2_004033C0
                  Source: C:\Users\user\Desktop\tSftorqHTy.exeCode function: 0_2_0044F4300_2_0044F430
                  Source: C:\Users\user\Desktop\tSftorqHTy.exeCode function: 0_2_004125E80_2_004125E8
                  Source: C:\Users\user\Desktop\tSftorqHTy.exeCode function: 0_2_0044663B0_2_0044663B
                  Source: C:\Users\user\Desktop\tSftorqHTy.exeCode function: 0_2_004138010_2_00413801
                  Source: C:\Users\user\Desktop\tSftorqHTy.exeCode function: 0_2_0042096F0_2_0042096F
                  Source: C:\Users\user\Desktop\tSftorqHTy.exeCode function: 0_2_004129D00_2_004129D0
                  Source: C:\Users\user\Desktop\tSftorqHTy.exeCode function: 0_2_004119E30_2_004119E3
                  Source: C:\Users\user\Desktop\tSftorqHTy.exeCode function: 0_2_0041C9AE0_2_0041C9AE
                  Source: C:\Users\user\Desktop\tSftorqHTy.exeCode function: 0_2_0047EA6F0_2_0047EA6F
                  Source: C:\Users\user\Desktop\tSftorqHTy.exeCode function: 0_2_0040FA100_2_0040FA10
                  Source: C:\Users\user\Desktop\tSftorqHTy.exeCode function: 0_2_0044EB5F0_2_0044EB5F
                  Source: C:\Users\user\Desktop\tSftorqHTy.exeCode function: 0_2_00423C810_2_00423C81
                  Source: C:\Users\user\Desktop\tSftorqHTy.exeCode function: 0_2_00411E780_2_00411E78
                  Source: C:\Users\user\Desktop\tSftorqHTy.exeCode function: 0_2_00442E0C0_2_00442E0C
                  Source: C:\Users\user\Desktop\tSftorqHTy.exeCode function: 0_2_00420EC00_2_00420EC0
                  Source: C:\Users\user\Desktop\tSftorqHTy.exeCode function: 0_2_0044CF170_2_0044CF17
                  Source: C:\Users\user\Desktop\tSftorqHTy.exeCode function: 0_2_00444FD20_2_00444FD2
                  Source: C:\Users\user\Desktop\tSftorqHTy.exeCode function: 0_2_00A836000_2_00A83600
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0109C5302_2_0109C530
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_010927B92_2_010927B9
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_01092DD12_2_01092DD1
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_010994802_2_01099480
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0109C5212_2_0109C521
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0109946F2_2_0109946F
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_069F26302_2_069F2630
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_069F4D782_2_069F4D78
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_069FBAD82_2_069FBAD8
                  Source: C:\Users\user\Desktop\tSftorqHTy.exeCode function: String function: 004115D7 appears 36 times
                  Source: C:\Users\user\Desktop\tSftorqHTy.exeCode function: String function: 00416C70 appears 39 times
                  Source: C:\Users\user\Desktop\tSftorqHTy.exeCode function: String function: 00445AE0 appears 65 times
                  Source: tSftorqHTy.exe, 00000000.00000002.1375265324.0000000000AA0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCloudServices.exe< vs tSftorqHTy.exe
                  Source: tSftorqHTy.exe, 00000000.00000003.1372683622.000000000419D000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs tSftorqHTy.exe
                  Source: tSftorqHTy.exe, 00000000.00000003.1372543016.0000000003FF3000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs tSftorqHTy.exe
                  Source: tSftorqHTy.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                  Source: 0.2.tSftorqHTy.exe.aa0000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 0.2.tSftorqHTy.exe.aa0000.1.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 0.2.tSftorqHTy.exe.aa0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 0.2.tSftorqHTy.exe.aa0000.1.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 00000002.00000002.2594091779.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 00000000.00000002.1375265324.0000000000AA0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 00000000.00000002.1375265324.0000000000AA0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: Process Memory Space: tSftorqHTy.exe PID: 3036, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: Process Memory Space: RegSvcs.exe PID: 6584, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 0.2.tSftorqHTy.exe.aa0000.1.raw.unpack, UltraSpeed.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.tSftorqHTy.exe.aa0000.1.raw.unpack, COVIDPickers.csCryptographic APIs: 'TransformFinalBlock'
                  Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/4@3/3
                  Source: C:\Users\user\Desktop\tSftorqHTy.exeCode function: 0_2_0044AF6C GetLastError,FormatMessageW,0_2_0044AF6C
                  Source: C:\Users\user\Desktop\tSftorqHTy.exeCode function: 0_2_004333BE GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState,0_2_004333BE
                  Source: C:\Users\user\Desktop\tSftorqHTy.exeCode function: 0_2_00464EAE OpenProcess,GetLastError,GetLastError,GetCurrentThread,OpenThreadToken,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,AdjustTokenPrivileges,GetLastError,OpenProcess,AdjustTokenPrivileges,CloseHandle,TerminateProcess,GetLastError,CloseHandle,0_2_00464EAE
                  Source: C:\Users\user\Desktop\tSftorqHTy.exeCode function: 0_2_0045D619 SetErrorMode,GetDiskFreeSpaceW,GetLastError,SetErrorMode,0_2_0045D619
                  Source: C:\Users\user\Desktop\tSftorqHTy.exeCode function: 0_2_004755C4 CreateToolhelp32Snapshot,Process32FirstW,__wsplitpath,_wcscat,__wcsicoll,Process32NextW,CloseHandle,0_2_004755C4
                  Source: C:\Users\user\Desktop\tSftorqHTy.exeCode function: 0_2_0047839D CoInitialize,CoCreateInstance,CoUninitialize,0_2_0047839D
                  Source: C:\Users\user\Desktop\tSftorqHTy.exeCode function: 0_2_0043305F __swprintf,__swprintf,__wcsicoll,FindResourceW,LoadResource,LockResource,FindResourceW,LoadResource,SizeofResource,LockResource,CreateIconFromResourceEx,0_2_0043305F
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: NULL
                  Source: C:\Users\user\Desktop\tSftorqHTy.exeFile created: C:\Users\user\AppData\Local\Temp\autF585.tmpJump to behavior
                  Source: tSftorqHTy.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: C:\Users\user\Desktop\tSftorqHTy.exeFile read: C:\Users\desktop.iniJump to behavior
                  Source: C:\Users\user\Desktop\tSftorqHTy.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: RegSvcs.exe, 00000002.00000002.2595080414.0000000002C50000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2595080414.0000000002C83000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2595080414.0000000002C60000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2595080414.0000000002C90000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2595080414.0000000002C6E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2595938699.0000000003B9D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                  Source: tSftorqHTy.exeVirustotal: Detection: 61%
                  Source: tSftorqHTy.exeReversingLabs: Detection: 60%
                  Source: C:\Users\user\Desktop\tSftorqHTy.exeFile read: C:\Users\user\Desktop\tSftorqHTy.exeJump to behavior
                  Source: unknownProcess created: C:\Users\user\Desktop\tSftorqHTy.exe "C:\Users\user\Desktop\tSftorqHTy.exe"
                  Source: C:\Users\user\Desktop\tSftorqHTy.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\tSftorqHTy.exe"
                  Source: C:\Users\user\Desktop\tSftorqHTy.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\tSftorqHTy.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\tSftorqHTy.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\Desktop\tSftorqHTy.exeSection loaded: wsock32.dllJump to behavior
                  Source: C:\Users\user\Desktop\tSftorqHTy.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\Desktop\tSftorqHTy.exeSection loaded: winmm.dllJump to behavior
                  Source: C:\Users\user\Desktop\tSftorqHTy.exeSection loaded: mpr.dllJump to behavior
                  Source: C:\Users\user\Desktop\tSftorqHTy.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Users\user\Desktop\tSftorqHTy.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\Desktop\tSftorqHTy.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\Desktop\tSftorqHTy.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\tSftorqHTy.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\Desktop\tSftorqHTy.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\tSftorqHTy.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                  Source: tSftorqHTy.exeStatic file information: File size 80740352 > 1048576
                  Source: Binary string: wntdll.pdbUGP source: tSftorqHTy.exe, 00000000.00000003.1372543016.0000000003ED0000.00000004.00001000.00020000.00000000.sdmp, tSftorqHTy.exe, 00000000.00000003.1373283962.0000000004070000.00000004.00001000.00020000.00000000.sdmp
                  Source: Binary string: wntdll.pdb source: tSftorqHTy.exe, 00000000.00000003.1372543016.0000000003ED0000.00000004.00001000.00020000.00000000.sdmp, tSftorqHTy.exe, 00000000.00000003.1373283962.0000000004070000.00000004.00001000.00020000.00000000.sdmp
                  Source: C:\Users\user\Desktop\tSftorqHTy.exeCode function: 0_2_0040EBD0 LoadLibraryA,GetProcAddress,0_2_0040EBD0
                  Source: C:\Users\user\Desktop\tSftorqHTy.exeCode function: 0_2_00416CB5 push ecx; ret 0_2_00416CC8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_069F8EAC push es; retf 2_2_069F8EB4
                  Source: C:\Users\user\Desktop\tSftorqHTy.exeCode function: 0_2_0047A330 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_0047A330
                  Source: C:\Users\user\Desktop\tSftorqHTy.exeCode function: 0_2_00434418 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00434418
                  Source: C:\Users\user\Desktop\tSftorqHTy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                  Malware Analysis System Evasion

                  barindex
                  Source: C:\Users\user\Desktop\tSftorqHTy.exeAPI/Special instruction interceptor: Address: A83224
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 3337Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 1182Jump to behavior
                  Source: C:\Users\user\Desktop\tSftorqHTy.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-87528
                  Source: C:\Users\user\Desktop\tSftorqHTy.exeAPI coverage: 4.2 %
                  Source: C:\Users\user\Desktop\tSftorqHTy.exeCode function: 0_2_004339B6 GetFileAttributesW,FindFirstFileW,FindClose,0_2_004339B6
                  Source: C:\Users\user\Desktop\tSftorqHTy.exeCode function: 0_2_00452492 FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00452492
                  Source: C:\Users\user\Desktop\tSftorqHTy.exeCode function: 0_2_00442886 FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00442886
                  Source: C:\Users\user\Desktop\tSftorqHTy.exeCode function: 0_2_004788BD FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_004788BD
                  Source: C:\Users\user\Desktop\tSftorqHTy.exeCode function: 0_2_0045CAFA FindFirstFileW,FindNextFileW,FindClose,0_2_0045CAFA
                  Source: C:\Users\user\Desktop\tSftorqHTy.exeCode function: 0_2_00431A86 FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00431A86
                  Source: C:\Users\user\Desktop\tSftorqHTy.exeCode function: 0_2_0044BD27 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose,0_2_0044BD27
                  Source: C:\Users\user\Desktop\tSftorqHTy.exeCode function: 0_2_0045DE8F FindFirstFileW,FindClose,0_2_0045DE8F
                  Source: C:\Users\user\Desktop\tSftorqHTy.exeCode function: 0_2_0044BF8B _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0044BF8B
                  Source: C:\Users\user\Desktop\tSftorqHTy.exeCode function: 0_2_0040E500 GetVersionExW,GetCurrentProcess,GetNativeSystemInfo,FreeLibrary,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo,FreeLibrary,0_2_0040E500
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 100000Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99890Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99750Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99640Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99531Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99410Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99281Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99158Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98997Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98844Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98647Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98537Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98375Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98265Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98156Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98047Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97937Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97828Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97719Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97594Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97484Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97369Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97250Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: RegSvcs.exe, 00000002.00000002.2594241259.0000000000DFA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll1
                  Source: C:\Users\user\Desktop\tSftorqHTy.exeAPI call chain: ExitProcess graph end nodegraph_0-86634
                  Source: C:\Users\user\Desktop\tSftorqHTy.exeCode function: 0_2_0045A370 BlockInput,0_2_0045A370
                  Source: C:\Users\user\Desktop\tSftorqHTy.exeCode function: 0_2_0040D590 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetModuleFileNameW,GetForegroundWindow,ShellExecuteW,GetForegroundWindow,ShellExecuteW,0_2_0040D590
                  Source: C:\Users\user\Desktop\tSftorqHTy.exeCode function: 0_2_0040EBD0 LoadLibraryA,GetProcAddress,0_2_0040EBD0
                  Source: C:\Users\user\Desktop\tSftorqHTy.exeCode function: 0_2_00A83490 mov eax, dword ptr fs:[00000030h]0_2_00A83490
                  Source: C:\Users\user\Desktop\tSftorqHTy.exeCode function: 0_2_00A834F0 mov eax, dword ptr fs:[00000030h]0_2_00A834F0
                  Source: C:\Users\user\Desktop\tSftorqHTy.exeCode function: 0_2_00A81E70 mov eax, dword ptr fs:[00000030h]0_2_00A81E70
                  Source: C:\Users\user\Desktop\tSftorqHTy.exeCode function: 0_2_004238DA __lseeki64_nolock,__lseeki64_nolock,GetProcessHeap,HeapAlloc,__setmode_nolock,__write_nolock,__setmode_nolock,GetProcessHeap,HeapFree,__lseeki64_nolock,SetEndOfFile,GetLastError,__lseeki64_nolock,0_2_004238DA
                  Source: C:\Users\user\Desktop\tSftorqHTy.exeCode function: 0_2_0041F250 SetUnhandledExceptionFilter,0_2_0041F250
                  Source: C:\Users\user\Desktop\tSftorqHTy.exeCode function: 0_2_0041A208 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0041A208
                  Source: C:\Users\user\Desktop\tSftorqHTy.exeCode function: 0_2_00417DAA IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00417DAA
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: 0.2.tSftorqHTy.exe.aa0000.1.raw.unpack, UltraSpeed.csReference to suspicious API methods: MapVirtualKey(VKCode, 0u)
                  Source: 0.2.tSftorqHTy.exe.aa0000.1.raw.unpack, FFDecryptor.csReference to suspicious API methods: Marshal.GetDelegateForFunctionPointer(GetProcAddress(hModule, method), typeof(T))
                  Source: 0.2.tSftorqHTy.exe.aa0000.1.raw.unpack, FFDecryptor.csReference to suspicious API methods: hModuleList.Add(LoadLibrary(text9 + "\\mozglue.dll"))
                  Source: C:\Users\user\Desktop\tSftorqHTy.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
                  Source: C:\Users\user\Desktop\tSftorqHTy.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: A52008Jump to behavior
                  Source: C:\Users\user\Desktop\tSftorqHTy.exeCode function: 0_2_00436CD7 LogonUserW,0_2_00436CD7
                  Source: C:\Users\user\Desktop\tSftorqHTy.exeCode function: 0_2_0040D590 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetModuleFileNameW,GetForegroundWindow,ShellExecuteW,GetForegroundWindow,ShellExecuteW,0_2_0040D590
                  Source: C:\Users\user\Desktop\tSftorqHTy.exeCode function: 0_2_00434418 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00434418
                  Source: C:\Users\user\Desktop\tSftorqHTy.exeCode function: 0_2_0043333C __wcsicoll,mouse_event,__wcsicoll,mouse_event,0_2_0043333C
                  Source: C:\Users\user\Desktop\tSftorqHTy.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\tSftorqHTy.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\tSftorqHTy.exeCode function: 0_2_00446124 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_00446124
                  Source: tSftorqHTy.exeBinary or memory string: Shell_TrayWnd
                  Source: tSftorqHTy.exeBinary or memory string: JDASCRWINUPRWINDOWNLWINUPLWINDOWNSHIFTUPSHIFTDOWNALTUPALTDOWNCTRLUPCTRLDOWNMOUSE_XBUTTON2MOUSE_XBUTTON1MOUSE_MBUTTONMOUSE_RBUTTONMOUSE_LBUTTONLAUNCH_APP2LAUNCH_APP1LAUNCH_MEDIALAUNCH_MAILMEDIA_PLAY_PAUSEMEDIA_STOPMEDIA_PREVMEDIA_NEXTVOLUME_UPVOLUME_DOWNVOLUME_MUTEBROWSER_HOMEBROWSER_FAVORTIESBROWSER_SEARCHBROWSER_STOPBROWSER_REFRESHBROWSER_FORWARDBROWSER_BACKNUMPADENTERSLEEPRSHIFTLSHIFTRALTLALTRCTRLLCTRLAPPSKEYNUMPADDIVNUMPADDOTNUMPADSUBNUMPADADDNUMPADMULTNUMPAD9NUMPAD8NUMPAD7NUMPAD6NUMPAD5NUMPAD4NUMPAD3NUMPAD2NUMPAD1NUMPAD0CAPSLOCKPAUSEBREAKNUMLOCKSCROLLLOCKRWINLWINPRINTSCREENUPTABSPACERIGHTPGUPPGDNLEFTINSERTINSHOMEF12F11F10F9F8F7F6F5F4F3F2F1ESCAPEESCENTERENDDOWNDELETEDELBSBACKSPACEALTONOFF0%d%dShell_TrayWndExitScript Pausedblankinfoquestionstopwarning
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\tSftorqHTy.exeCode function: 0_2_004720DB GetLocalTime,__swprintf,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,0_2_004720DB
                  Source: C:\Users\user\Desktop\tSftorqHTy.exeCode function: 0_2_00472C3F GetUserNameW,0_2_00472C3F
                  Source: C:\Users\user\Desktop\tSftorqHTy.exeCode function: 0_2_0041E364 __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,_strcpy_s,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,WideCharToMultiByte,0_2_0041E364
                  Source: C:\Users\user\Desktop\tSftorqHTy.exeCode function: 0_2_0040E500 GetVersionExW,GetCurrentProcess,GetNativeSystemInfo,FreeLibrary,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo,FreeLibrary,0_2_0040E500
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: 0.2.tSftorqHTy.exe.aa0000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.tSftorqHTy.exe.aa0000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000002.00000002.2594091779.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1375265324.0000000000AA0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: tSftorqHTy.exe PID: 3036, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6584, type: MEMORYSTR
                  Source: Yara matchFile source: 0.2.tSftorqHTy.exe.aa0000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.tSftorqHTy.exe.aa0000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000002.00000002.2594091779.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1375265324.0000000000AA0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: tSftorqHTy.exe PID: 3036, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6584, type: MEMORYSTR
                  Source: Yara matchFile source: 0.2.tSftorqHTy.exe.aa0000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.tSftorqHTy.exe.aa0000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000002.00000002.2594091779.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1375265324.0000000000AA0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.2595080414.0000000002CC6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: tSftorqHTy.exe PID: 3036, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6584, type: MEMORYSTR
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                  Source: tSftorqHTy.exeBinary or memory string: WIN_XP
                  Source: tSftorqHTy.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPWIN_2000InstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 8, 1USERPROFILEUSERDOMAINUSERDNSDOMAINDefaultGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYadvapi32.dllRegDeleteKeyExW+.-.+-\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]ISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXISTSEXPANDmsctls_statusbar321tooltips_class32AutoIt v3 GUI%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----&
                  Source: tSftorqHTy.exeBinary or memory string: WIN_XPe
                  Source: tSftorqHTy.exeBinary or memory string: WIN_VISTA
                  Source: tSftorqHTy.exeBinary or memory string: WIN_7
                  Source: tSftorqHTy.exeBinary or memory string: WIN_8
                  Source: Yara matchFile source: 0.2.tSftorqHTy.exe.aa0000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.tSftorqHTy.exe.aa0000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000002.00000002.2594091779.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1375265324.0000000000AA0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.2595080414.0000000002CC6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: tSftorqHTy.exe PID: 3036, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6584, type: MEMORYSTR

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: 0.2.tSftorqHTy.exe.aa0000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.tSftorqHTy.exe.aa0000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000002.00000002.2594091779.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1375265324.0000000000AA0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: tSftorqHTy.exe PID: 3036, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6584, type: MEMORYSTR
                  Source: Yara matchFile source: 0.2.tSftorqHTy.exe.aa0000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.tSftorqHTy.exe.aa0000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000002.00000002.2594091779.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1375265324.0000000000AA0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: tSftorqHTy.exe PID: 3036, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6584, type: MEMORYSTR
                  Source: Yara matchFile source: 0.2.tSftorqHTy.exe.aa0000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.tSftorqHTy.exe.aa0000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000002.00000002.2594091779.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1375265324.0000000000AA0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.2595080414.0000000002CC6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: tSftorqHTy.exe PID: 3036, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6584, type: MEMORYSTR
                  Source: C:\Users\user\Desktop\tSftorqHTy.exeCode function: 0_2_004652BE socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,0_2_004652BE
                  Source: C:\Users\user\Desktop\tSftorqHTy.exeCode function: 0_2_00476619 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00476619
                  Source: C:\Users\user\Desktop\tSftorqHTy.exeCode function: 0_2_0046CEF3 OleInitialize,_wcslen,CreateBindCtx,MkParseDisplayName,CLSIDFromProgID,GetActiveObject,0_2_0046CEF3
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity InformationAcquire Infrastructure2
                  Valid Accounts
                  12
                  Native API
                  1
                  DLL Side-Loading
                  1
                  Exploitation for Privilege Escalation
                  11
                  Disable or Modify Tools
                  1
                  OS Credential Dumping
                  2
                  System Time Discovery
                  Remote Services11
                  Archive Collected Data
                  2
                  Ingress Tool Transfer
                  Exfiltration Over Other Network Medium1
                  System Shutdown/Reboot
                  CredentialsDomainsDefault AccountsScheduled Task/Job2
                  Valid Accounts
                  1
                  DLL Side-Loading
                  11
                  Deobfuscate/Decode Files or Information
                  121
                  Input Capture
                  1
                  Account Discovery
                  Remote Desktop Protocol1
                  Data from Local System
                  11
                  Encrypted Channel
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)2
                  Valid Accounts
                  3
                  Obfuscated Files or Information
                  Security Account Manager2
                  File and Directory Discovery
                  SMB/Windows Admin Shares1
                  Email Collection
                  1
                  Non-Standard Port
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
                  Access Token Manipulation
                  1
                  DLL Side-Loading
                  NTDS117
                  System Information Discovery
                  Distributed Component Object Model121
                  Input Capture
                  2
                  Non-Application Layer Protocol
                  Traffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script212
                  Process Injection
                  2
                  Valid Accounts
                  LSA Secrets121
                  Security Software Discovery
                  SSH3
                  Clipboard Data
                  23
                  Application Layer Protocol
                  Scheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts11
                  Virtualization/Sandbox Evasion
                  Cached Domain Credentials11
                  Virtualization/Sandbox Evasion
                  VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items21
                  Access Token Manipulation
                  DCSync2
                  Process Discovery
                  Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                  Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job212
                  Process Injection
                  Proc Filesystem11
                  Application Window Discovery
                  Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                  Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
                  System Owner/User Discovery
                  Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                  IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing1
                  System Network Configuration Discovery
                  Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  tSftorqHTy.exe62%VirustotalBrowse
                  tSftorqHTy.exe61%ReversingLabsWin32.Trojan.Autoitinject
                  tSftorqHTy.exe100%AviraTR/Dropper.Gen
                  No Antivirus matches
                  No Antivirus matches
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  http://mail.grupomaya.mxd0%Avira URL Cloudsafe
                  http://grupomaya.mxd0%Avira URL Cloudsafe
                  http://mail.grupomaya.mx0%Avira URL Cloudsafe
                  http://grupomaya.mx0%Avira URL Cloudsafe
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  reallyfreegeoip.org
                  104.21.16.1
                  truefalse
                    high
                    grupomaya.mx
                    198.59.144.139
                    truetrue
                      unknown
                      checkip.dyndns.com
                      132.226.247.73
                      truefalse
                        high
                        mail.grupomaya.mx
                        unknown
                        unknowntrue
                          unknown
                          checkip.dyndns.org
                          unknown
                          unknownfalse
                            high
                            NameMaliciousAntivirus DetectionReputation
                            https://reallyfreegeoip.org/xml/8.46.123.189false
                              high
                              http://checkip.dyndns.org/false
                                high
                                NameSourceMaliciousAntivirus DetectionReputation
                                https://api.telegram.org/botRegSvcs.exe, 00000002.00000002.2595080414.0000000002CC6000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://grupomaya.mxdRegSvcs.exe, 00000002.00000002.2595080414.0000000002CC6000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://reallyfreegeoip.orgdRegSvcs.exe, 00000002.00000002.2595080414.0000000002C0D000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://mail.grupomaya.mxdRegSvcs.exe, 00000002.00000002.2595080414.0000000002CC6000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://r10.o.lencr.org0#RegSvcs.exe, 00000002.00000002.2596505211.000000000603F000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2594241259.0000000000DFA000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2595080414.0000000002CC6000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2596505211.0000000006000000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      http://checkip.dyndns.orgRegSvcs.exe, 00000002.00000002.2595080414.0000000002BF0000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2595080414.0000000002CC6000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2595080414.0000000002BDE000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://mail.grupomaya.mxRegSvcs.exe, 00000002.00000002.2595080414.0000000002CC6000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        https://reallyfreegeoip.org/xml/8.46.123.189lRegSvcs.exe, 00000002.00000002.2595080414.0000000002BF0000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://checkip.dyndns.comdRegSvcs.exe, 00000002.00000002.2595080414.0000000002BF0000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            http://x1.c.lencr.org/0RegSvcs.exe, 00000002.00000002.2596505211.000000000603F000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2594241259.0000000000DFA000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2595080414.0000000002CC6000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2596505211.0000000006000000.00000004.00000020.00020000.00000000.sdmpfalse
                                              high
                                              http://x1.i.lencr.org/0RegSvcs.exe, 00000002.00000002.2596505211.000000000603F000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2594241259.0000000000DFA000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2595080414.0000000002CC6000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2596505211.0000000006000000.00000004.00000020.00020000.00000000.sdmpfalse
                                                high
                                                http://checkip.dyndns.org/qtSftorqHTy.exe, 00000000.00000002.1375265324.0000000000AA0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2594091779.0000000000402000.00000040.80000000.00040000.00000000.sdmpfalse
                                                  high
                                                  https://reallyfreegeoip.org/xml/8.46.123.189dRegSvcs.exe, 00000002.00000002.2595080414.0000000002BF0000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    http://reallyfreegeoip.orgRegSvcs.exe, 00000002.00000002.2595080414.0000000002C0D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      http://checkip.dyndns.orgdRegSvcs.exe, 00000002.00000002.2595080414.0000000002BF0000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        https://reallyfreegeoip.orgRegSvcs.exe, 00000002.00000002.2595080414.0000000002BF0000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          http://checkip.dyndns.comRegSvcs.exe, 00000002.00000002.2595080414.0000000002BF0000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            http://grupomaya.mxRegSvcs.exe, 00000002.00000002.2595080414.0000000002CC6000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            http://checkip.dyndns.org/dRegSvcs.exe, 00000002.00000002.2595080414.0000000002BF0000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2595080414.0000000002CC6000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRegSvcs.exe, 00000002.00000002.2595080414.0000000002B71000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                high
                                                                https://api.telegram.org/bot-/sendDocument?chat_id=tSftorqHTy.exe, 00000000.00000002.1375265324.0000000000AA0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2594091779.0000000000402000.00000040.80000000.00040000.00000000.sdmpfalse
                                                                  high
                                                                  http://r10.i.lencr.org/0RegSvcs.exe, 00000002.00000002.2596505211.000000000603F000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2594241259.0000000000DFA000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2595080414.0000000002CC6000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2596505211.0000000006000000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                    high
                                                                    https://reallyfreegeoip.org/xml/tSftorqHTy.exe, 00000000.00000002.1375265324.0000000000AA0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2594091779.0000000000402000.00000040.80000000.00040000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2595080414.0000000002BF0000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      high
                                                                      • No. of IPs < 25%
                                                                      • 25% < No. of IPs < 50%
                                                                      • 50% < No. of IPs < 75%
                                                                      • 75% < No. of IPs
                                                                      IPDomainCountryFlagASNASN NameMalicious
                                                                      104.21.16.1
                                                                      reallyfreegeoip.orgUnited States
                                                                      13335CLOUDFLARENETUSfalse
                                                                      198.59.144.139
                                                                      grupomaya.mxUnited States
                                                                      13332HYPEENT-SJUStrue
                                                                      132.226.247.73
                                                                      checkip.dyndns.comUnited States
                                                                      16989UTMEMUSfalse
                                                                      Joe Sandbox version:42.0.0 Malachite
                                                                      Analysis ID:1632313
                                                                      Start date and time:2025-03-07 22:12:46 +01:00
                                                                      Joe Sandbox product:CloudBasic
                                                                      Overall analysis duration:0h 6m 15s
                                                                      Hypervisor based Inspection enabled:false
                                                                      Report type:full
                                                                      Cookbook file name:default.jbs
                                                                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                      Number of analysed new started processes analysed:11
                                                                      Number of new started drivers analysed:0
                                                                      Number of existing processes analysed:0
                                                                      Number of existing drivers analysed:0
                                                                      Number of injected processes analysed:0
                                                                      Technologies:
                                                                      • HCA enabled
                                                                      • EGA enabled
                                                                      • AMSI enabled
                                                                      Analysis Mode:default
                                                                      Analysis stop reason:Timeout
                                                                      Sample name:tSftorqHTy.exe
                                                                      renamed because original name is a hash value
                                                                      Original Sample Name:2bbb422d5c12723784ee8139173b72ebf1ee0b88ba45b7e6c08265e53dc2fb14.exe
                                                                      Detection:MAL
                                                                      Classification:mal100.troj.spyw.evad.winEXE@3/4@3/3
                                                                      EGA Information:
                                                                      • Successful, ratio: 100%
                                                                      HCA Information:
                                                                      • Successful, ratio: 100%
                                                                      • Number of executed functions: 67
                                                                      • Number of non-executed functions: 294
                                                                      Cookbook Comments:
                                                                      • Found application associated with file extension: .exe
                                                                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, BackgroundTransferHost.exe, RuntimeBroker.exe, WMIADAP.exe, backgroundTaskHost.exe, conhost.exe
                                                                      • Excluded IPs from analysis (whitelisted): 23.60.203.209, 150.171.28.10
                                                                      • Excluded domains from analysis (whitelisted): c2a9c95e369881c67228a6591cac2686.clo.footprintdns.com, ax-ring.msedge.net, fs.microsoft.com, g.bing.com
                                                                      • Not all processes where analyzed, report is missing behavior information
                                                                      • Report size exceeded maximum capacity and may have missing disassembly code.
                                                                      • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                                                      • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                                      TimeTypeDescription
                                                                      16:13:56API Interceptor23x Sleep call for process: RegSvcs.exe modified
                                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                      104.21.16.10IrTeguWM7.exeGet hashmaliciousFormBookBrowse
                                                                      • www.tumbetgirislinki.fit/ftbq/
                                                                      Shipping Document.exeGet hashmaliciousFormBookBrowse
                                                                      • www.rbopisalive.cyou/6m32/
                                                                      Payment Record.exeGet hashmaliciousLokibotBrowse
                                                                      • touxzw.ir/sccc/five/fre.php
                                                                      Invoice Remittance ref27022558.exeGet hashmaliciousFormBookBrowse
                                                                      • www.rbopisalive.cyou/a669/
                                                                      ujXpculHYDYhc6i.exeGet hashmaliciousLokibotBrowse
                                                                      • touxzw.ir/sss2/five/fre.php
                                                                      368c6e62-b031-5b65-fd43-e7a610184138.emlGet hashmaliciousHTMLPhisherBrowse
                                                                      • ce60771026585.oakdiiocese.org/p/298?session=770558a25b5d1fcbb8d81f113631d430f5b8d022cdc6d97cf6b16a412a3be9e6
                                                                      http://orico-rapaciid.xqyrr.cn/eorico/login/Get hashmaliciousUnknownBrowse
                                                                      • orico-rapaciid.xqyrr.cn/favicon.ico
                                                                      Order confirmation.exeGet hashmaliciousFormBookBrowse
                                                                      • www.englishmaterials.net/3nop/?-Z=cjlpd&Vz=5VQMUr9vdJst/aGqnmtehORilpahgrSgoeoRp4hSLdasMjOC27ijg2BR7Ep4jmwJ4Zkm
                                                                      Bank Transfer Accounting Copy.Vbs.vbsGet hashmaliciousFormBookBrowse
                                                                      • www.fz977.xyz/48bq/
                                                                      PO from tpc Type 34.1 34,2 35 Spec.jsGet hashmaliciousFormBookBrowse
                                                                      • www.lucynoel6465.shop/jgkl/
                                                                      198.59.144.139TfRJR0Y3uW.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                                        NmuA605dM4.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                                          qUG1ZROxLJ.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                                            Pago 20250211.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                                              ESrXps2S0J.exeGet hashmaliciousMassLogger RATBrowse
                                                                                owcaUFSF2e.exeGet hashmaliciousMassLogger RATBrowse
                                                                                  Cp3HR4KHgC.exeGet hashmaliciousMassLogger RATBrowse
                                                                                    132.226.247.73DayVXJx1km.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                    • checkip.dyndns.org/
                                                                                    cexqIzhyvM.exeGet hashmaliciousGuLoaderBrowse
                                                                                    • checkip.dyndns.org/
                                                                                    drRbNknjyb.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                    • checkip.dyndns.org/
                                                                                    pkNnK2ya0f.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                    • checkip.dyndns.org/
                                                                                    DHL Shipping Details Ref ID 446331798008765975594-pdf.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                                                    • checkip.dyndns.org/
                                                                                    ZTEIhNCtP3.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                    • checkip.dyndns.org/
                                                                                    uPDwUy9ewY.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                    • checkip.dyndns.org/
                                                                                    qUG1ZROxLJ.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                                                    • checkip.dyndns.org/
                                                                                    HT4YGXBRtx.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                    • checkip.dyndns.org/
                                                                                    4LJHFzA8jr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                    • checkip.dyndns.org/
                                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                    checkip.dyndns.comO20L0ptxGs.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                    • 158.101.44.242
                                                                                    DayVXJx1km.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                    • 132.226.247.73
                                                                                    NDCNDvC27F.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                    • 132.226.8.169
                                                                                    NDCNDvC27F.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                    • 193.122.6.168
                                                                                    cexqIzhyvM.exeGet hashmaliciousGuLoaderBrowse
                                                                                    • 132.226.247.73
                                                                                    3c638k0NJx.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                    • 158.101.44.242
                                                                                    drRbNknjyb.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                    • 132.226.247.73
                                                                                    3GrfjMY0pG.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                    • 193.122.6.168
                                                                                    TfRJR0Y3uW.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                                                    • 132.226.8.169
                                                                                    DNNueAb5UZ.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                    • 132.226.8.169
                                                                                    reallyfreegeoip.orgO20L0ptxGs.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                    • 104.21.32.1
                                                                                    DayVXJx1km.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                    • 104.21.64.1
                                                                                    NDCNDvC27F.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                    • 104.21.32.1
                                                                                    NDCNDvC27F.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                    • 104.21.48.1
                                                                                    cexqIzhyvM.exeGet hashmaliciousGuLoaderBrowse
                                                                                    • 104.21.96.1
                                                                                    3c638k0NJx.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                    • 104.21.96.1
                                                                                    drRbNknjyb.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                    • 104.21.48.1
                                                                                    3GrfjMY0pG.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                    • 104.21.96.1
                                                                                    TfRJR0Y3uW.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                                                    • 104.21.32.1
                                                                                    DNNueAb5UZ.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                    • 104.21.112.1
                                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                    CLOUDFLARENETUSPlay_Voicemail_Transcription._(387.KB).svgGet hashmaliciousHTMLPhisherBrowse
                                                                                    • 172.67.167.74
                                                                                    tmezkNPazz.exeGet hashmaliciousNetSupport RATBrowse
                                                                                    • 104.26.1.231
                                                                                    DQBok03QL1.exeGet hashmaliciousLummaC StealerBrowse
                                                                                    • 172.67.187.236
                                                                                    ORLVDnEcC3.exeGet hashmaliciousLummaC StealerBrowse
                                                                                    • 172.67.189.66
                                                                                    kS9YOZjwfn.exeGet hashmaliciousLummaC StealerBrowse
                                                                                    • 188.114.97.3
                                                                                    rakf6nyw06.exeGet hashmaliciousLummaC StealerBrowse
                                                                                    • 172.67.187.236
                                                                                    Z6ojPnRBp1.exeGet hashmaliciousRedLineBrowse
                                                                                    • 104.26.13.31
                                                                                    thUKanu6GD.lnkGet hashmaliciousHTMLPhisher, MalLnkBrowse
                                                                                    • 188.114.96.3
                                                                                    iJIXzyHnSe.exeGet hashmaliciousFormBookBrowse
                                                                                    • 172.67.194.22
                                                                                    O20L0ptxGs.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                    • 104.21.32.1
                                                                                    HYPEENT-SJUSTfRJR0Y3uW.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                                                    • 198.59.144.139
                                                                                    NmuA605dM4.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                                                    • 198.59.144.139
                                                                                    qUG1ZROxLJ.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                                                    • 198.59.144.139
                                                                                    arm.elfGet hashmaliciousUnknownBrowse
                                                                                    • 206.206.98.7
                                                                                    Pago 20250211.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                                                    • 198.59.144.139
                                                                                    https://www.irmaflores.net/suh/*Get hashmaliciousUnknownBrowse
                                                                                    • 206.206.123.61
                                                                                    linux_ppc64el.elfGet hashmaliciousChaosBrowse
                                                                                    • 206.206.76.202
                                                                                    linux_arm6.elfGet hashmaliciousChaosBrowse
                                                                                    • 206.206.76.202
                                                                                    linux_arm7.elfGet hashmaliciousChaosBrowse
                                                                                    • 206.206.76.202
                                                                                    linux_amd64.elfGet hashmaliciousChaosBrowse
                                                                                    • 206.206.76.202
                                                                                    UTMEMUSDayVXJx1km.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                    • 132.226.247.73
                                                                                    NDCNDvC27F.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                    • 132.226.8.169
                                                                                    cexqIzhyvM.exeGet hashmaliciousGuLoaderBrowse
                                                                                    • 132.226.247.73
                                                                                    drRbNknjyb.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                    • 132.226.247.73
                                                                                    TfRJR0Y3uW.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                                                    • 132.226.8.169
                                                                                    DNNueAb5UZ.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                    • 132.226.8.169
                                                                                    NmuA605dM4.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                                                    • 132.226.8.169
                                                                                    4PYRGCo1Di.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                    • 132.226.8.169
                                                                                    pkNnK2ya0f.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                    • 132.226.247.73
                                                                                    XiJhd7Lx30.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                    • 132.226.8.169
                                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                    54328bd36c14bd82ddaa0c04b25ed9adZ6ojPnRBp1.exeGet hashmaliciousRedLineBrowse
                                                                                    • 104.21.16.1
                                                                                    O20L0ptxGs.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                    • 104.21.16.1
                                                                                    DayVXJx1km.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                    • 104.21.16.1
                                                                                    NDCNDvC27F.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                    • 104.21.16.1
                                                                                    NDCNDvC27F.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                    • 104.21.16.1
                                                                                    cexqIzhyvM.exeGet hashmaliciousGuLoaderBrowse
                                                                                    • 104.21.16.1
                                                                                    3c638k0NJx.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                    • 104.21.16.1
                                                                                    drRbNknjyb.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                    • 104.21.16.1
                                                                                    3GrfjMY0pG.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                    • 104.21.16.1
                                                                                    TfRJR0Y3uW.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                                                    • 104.21.16.1
                                                                                    No context
                                                                                    Process:C:\Users\user\Desktop\tSftorqHTy.exe
                                                                                    File Type:data
                                                                                    Category:dropped
                                                                                    Size (bytes):16354
                                                                                    Entropy (8bit):7.504858870121142
                                                                                    Encrypted:false
                                                                                    SSDEEP:384:NrBdiwTfVE5f+P9pIKoLmy9klpJv7pY/H:D4GfA+FWKA52lpJe/H
                                                                                    MD5:E2681733E529DA6D5DCE70E3061E128C
                                                                                    SHA1:1859026F760B2875630023074D80EC09E19193CF
                                                                                    SHA-256:74052588C980D56FDB924155B2E6A80CF36E153F9E6C1670AF56DA07F915384B
                                                                                    SHA-512:EAB43F5A4A909BE20DFE46BEB6B9AD66F34FA8FB4AEB17406BB13920930F3E94EFE44BDE0E2BE0CB3211A2ECCAEB022446FBE698C0A19A4C0465CE03533A9535
                                                                                    Malicious:false
                                                                                    Reputation:low
                                                                                    Preview:EA06..`&.N&3)..m5.L...x.....+...n....(.V.`..4........#92.........M..>i....8.2..@...(.W.6......9........K|..o....B....V..o.d.i...h~3.!....9...@.?.{....6.....?..(...3.....?.......9....?..!.r.....|. 8O..j...M..?......6.8..`C.......}..P|...=....-....@i.........|.`...<!........y.........:......p.....X...Z....C.-......?.....[2....@<>{(...o4....C..p-...j........0-..Vj.....t~3.)O..l.i...B.?.[ n..8.....?.k n..!I..Y.u?.,........R..V@.O.B..j...~....U.8C......n...'..e....)?..(...!I..YF6?.Y.X'..6....l p....%[....p..,..L..b..Z....-..7..h..p.O.....h..p.O..r.....h|.qdO..*3.L...f.n....Y..A..h.......Y..7.t..&........HC.....?..g'..a.8.....x...a.8..C.?.k.....7......C....s._.8.B.?..!....!.N@.?...I'...9..B:?..!..&q...h?..-....i....?...`...3..........C........"......`.....0!..V.X!.L.b?...`...i..X..?.Y.....X!..X.h?.C.....i..........f...,.+..,.U....V1>.....d..bq..U...x...n?.k....G1...' M.4......@7..t.'....2...7.......... ......Z~.@.O...q....|.............s..o......X..`.....
                                                                                    Process:C:\Users\user\Desktop\tSftorqHTy.exe
                                                                                    File Type:data
                                                                                    Category:dropped
                                                                                    Size (bytes):60724
                                                                                    Entropy (8bit):7.895533447021336
                                                                                    Encrypted:false
                                                                                    SSDEEP:768:cgS8IZo79pD/tj2hrJVNrGKb+y9htkCNA5XdgW+9ekoYcLJAZ2KO4HSxdo7yDVS3:YZ/rzAKieDBA3WoRbAZnr2RRgF
                                                                                    MD5:C71531812B4CCCA1B16DEE511AAB37AD
                                                                                    SHA1:9857AEB19BAC6ED551858C009BB373E211209EEE
                                                                                    SHA-256:72EB7D608F5529DAA87FA23FF8BB1C11F126981A75C642B7B9E22B3C16D65A84
                                                                                    SHA-512:DFBD3838B6F41C708D22439CB42A48EF80A7D06FCC5574EA96926A5788A59522D11D16886F012DEBE400F7C8C23F9BB2D1CCE8C93721EB396BDE677AB3D2427A
                                                                                    Malicious:false
                                                                                    Reputation:low
                                                                                    Preview:EA06..n..F.tY...1.T+4=...4.Rf3`......(@.y....| ...F......>...2.(..YG.Nhu...E,....=z.p..2..j. ...h..}*.I....j......Y..*._,....X..3....:.NC5.Rg ....t..X.,....L.mp..*4Y...?5P..h..:,../....4.Vf3j...U.......7c....l..........hTP..../..]..Z..X.....f5....,..h....Q...`.....1._.s....X.......a2.!*.....S..-...j.:..k....n........v.V` ...gg7.......mU....:,..I..@....q..Lf.....$...n.u...bk@.Mf...........,....p....,I...!.v.BS..I8.aF.,*.............Z.XU.q.}f.K.....FmP...y.V.I..D.,..4.P.3J.f.2.Qf..L.mP..,.:,..M....5..O....+...B...R.Uf...T...>c6.........M.W.....B..U......X..Zmf.G.....,.....@..|.....k6.....\.v...AB..c.....F.!,S...OU...1...'H..R..,z.c..^.}.GF...3......[n.*L.mz......r.^.T+4.=.4.@.3j.f....l UE~.i..f.JLf.P..h7......!...-..6.Z.t...g<..G.Y...4.........&[60P......)1..B.....sKT.....1...:8..[....^iB..c.P...j.R.8....Q.Rm`)EJ.>.......i+..<...1..\q`-d...ZZ@k[].n..t-.. .......".........5....G.Pf.P...?..R.K .[W.D.*lo.O.s..JE.3...-y ..<..P...P.....2...gf3j.d.p......[..y
                                                                                    Process:C:\Users\user\Desktop\tSftorqHTy.exe
                                                                                    File Type:ASCII text, with very long lines (65536), with no line terminators
                                                                                    Category:dropped
                                                                                    Size (bytes):286758
                                                                                    Entropy (8bit):2.8090187480860234
                                                                                    Encrypted:false
                                                                                    SSDEEP:12:v8r0N20S20pm0K20jE0O050G0W90iJE0hE0y0Lm0/kkkkkU0Ckkkkkki90EkkkkJ:u
                                                                                    MD5:0C191B09CB9BA1D84125241322D524FC
                                                                                    SHA1:F71EA17287C8B2A628E3DFD82380C7BABF2C2A8A
                                                                                    SHA-256:EDBC2BA1C3E16A2D10894BE6636FC9D1FBF40523AEFE15432F6B7695D2535307
                                                                                    SHA-512:187B7D5C841F305F2A315FC80B18EB1AF6C1FA4A1E3EEBE3A02ECB2A1F1532A8790017791EE3B0634C73EEEC0FE31B07CBF6EA0C2B580C2C805932416C735BA6
                                                                                    Malicious:false
                                                                                    Reputation:low
                                                                                    Preview:2812506500281250650x281250650528125065052812506508281250650b281250650e281250650c28125065082812506501281250650e281250650c281250650c281250650c2812506500281250650228125065002812506500281250650028125065002812506505281250650628125065052812506507281250650b28125065082812506506281250650b28125065002812506500281250650028125065002812506500281250650028125065062812506506281250650828125065092812506504281250650528125065082812506504281250650b28125065092812506506281250650528125065002812506500281250650028125065002812506500281250650028125065062812506506281250650828125065092812506504281250650d28125065082812506506281250650b281250650a2812506507281250650228125065002812506500281250650028125065002812506500281250650028125065062812506506281250650828125065092812506505281250650528125065082812506508281250650b28125065082812506506281250650e2812506500281250650028125065002812506500281250650028125065002812506506281250650628125065082812506509281250650428125065052812506508281250650a281250650b281250650928125065062812506505
                                                                                    Process:C:\Users\user\Desktop\tSftorqHTy.exe
                                                                                    File Type:data
                                                                                    Category:dropped
                                                                                    Size (bytes):93696
                                                                                    Entropy (8bit):6.746422105992228
                                                                                    Encrypted:false
                                                                                    SSDEEP:1536:QN2Ro6U2DFpXWfw3T0bRReg2tgf9KnRH4SvRJIDTYP682SGJ6M7xVRhWBju+SRrS:q2RHpFAbre3ufgFHl6tSGp7TWBju+SR+
                                                                                    MD5:2BD9B148FF0B7126AB53AEAAFC65B0E3
                                                                                    SHA1:EFEA6C422E122C399D8ADFB2DEA6D8118F912285
                                                                                    SHA-256:B917E61AF587E2F4DF89D58E4E74C99A8F1D1D5436FAB8EBB9870DA5CA1720B2
                                                                                    SHA-512:32A0F06D9F14856B2E2472A2C8CE96C0B85BE7194C0754B639A7503D3A836CF95603D24D212925AAA7AC840C54F7F6CFC4F62A508303C17EC725AEED12AE29BB
                                                                                    Malicious:false
                                                                                    Reputation:low
                                                                                    Preview:...E7BI12PYC..E4.I16PYCA.E4BI16PYCASE4BI16PYCASE4BI16PYCASE4.I16^F.OS.=.h.7..b.;,Gb9CY7+",s&U,'^Bp;&a!0Zb _....a>*P'g<;Z}CASE4BIasPY.@PE.,..6PYCASE4.I37[X.AS!5BI96PYCAS.CI1.PYC.RE4B.16pYCAQE4FI16PYCAUE4BI16PY.@SE6BI16PYAA3.4BY16@YCASU4BY16PYCACE4BI16PYCAS..CIb6PYC.RE.GI16PYCASE4BI16PYCAS.5BE16PYCASE4BI16PYCASE4BI16PYCASE4BI16PYCASE4BI16PYCASE.BI96PYCASE4BI1>pYC.SE4BI16PYCA}1Q:=16P.!@SE.BI1RQYCCSE4BI16PYCASE4bI1V~+030E4B.46PY.@SE2BI1PQYCASE4BI16PYC.SEtl;TZ?:CA_E4BI.7PYAASEXCI16PYCASE4BI1vPY.ASE4BI16PYCASE4B.7PYCAS.4BI36UY..SE0.I15PYC.SE2.16.YCASE4BI16PYCASE4BI16PYCASE4BI16PYCASE4BI16.$.N...+:..PYCASE5@J50XQCASE4BI1HPYC.SE4.I16gYCAvE4B$16P}CAS;4BIO6PY'ASEFBI1WPYC.SE4-I16>YCA-E4BW3.OYCKyc4@a.6PSCk.6.BI;.QYCE g4BC.4PYG2pE4H.26P]0eSE>.M16T*fASO.GI12z.CB.S2BI*YhYCKSF.WO16KseAQm.BI;6z.CB.P2BI*.rYA.ZE4FcgEMYCG{.4BCE?PYA.YE4Fc/4x.CAYo.<Z16TrCkq; BI5.Psa?FE4Fb1.r'UASA.Bc.HGYCExE.DcS6".OA#F[#I10x.CAYmtBI76zcC?]E4FK^.PYIgy.4j.16VYk.SE2Bab6P_Ci.E4DI.cPYEAy.4j.16VYk.SE2Bc.6.jCAWi3<z16TrU?bE4F.7NP
                                                                                    File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                    Entropy (8bit):0.11984804614400055
                                                                                    TrID:
                                                                                    • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                                    • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                    • DOS Executable Generic (2002/1) 0.02%
                                                                                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                    File name:tSftorqHTy.exe
                                                                                    File size:80'740'352 bytes
                                                                                    MD5:c2792411f364989ec0d213a3ab7c4f94
                                                                                    SHA1:ea0aa28c567ba49407fe84f2df04d232ac7b9147
                                                                                    SHA256:2bbb422d5c12723784ee8139173b72ebf1ee0b88ba45b7e6c08265e53dc2fb14
                                                                                    SHA512:1a20a76fc0d77cc9c2c7c87cab18fde230a479e4ca2102f8097b51ea5e47fcd02573d5ef59f3c2b8e963b9ce3a816572db8edd10a01639bee44e7f710ae8e680
                                                                                    SSDEEP:12288:ehkDgouVA2nxKkorvdRgQriDwOIxmxiZnYQE7PJcE4aCYEhV1x2OF4:uRmJkcoQricOIQxiZY1iaC9hTF
                                                                                    TLSH:0C08AF21F5C69036C2B323B19E7EF76A963D79360336D29727C82D315EA05416B2A733
                                                                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........................1b.......P.).....Q.......y.......i..........}....N.......d.......`.......m.......g.....Rich............PE..L..
                                                                                    Icon Hash:1733312925935517
                                                                                    Entrypoint:0x4165c1
                                                                                    Entrypoint Section:.text
                                                                                    Digitally signed:false
                                                                                    Imagebase:0x400000
                                                                                    Subsystem:windows gui
                                                                                    Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                                                                    DLL Characteristics:TERMINAL_SERVER_AWARE
                                                                                    Time Stamp:0x4F25BAEC [Sun Jan 29 21:32:28 2012 UTC]
                                                                                    TLS Callbacks:
                                                                                    CLR (.Net) Version:
                                                                                    OS Version Major:5
                                                                                    OS Version Minor:0
                                                                                    File Version Major:5
                                                                                    File Version Minor:0
                                                                                    Subsystem Version Major:5
                                                                                    Subsystem Version Minor:0
                                                                                    Import Hash:d3bf8a7746a8d1ee8f6e5960c3f69378
                                                                                    Instruction
                                                                                    call 00007FA0D882A8FBh
                                                                                    jmp 00007FA0D882176Eh
                                                                                    int3
                                                                                    int3
                                                                                    int3
                                                                                    int3
                                                                                    int3
                                                                                    push ebp
                                                                                    mov ebp, esp
                                                                                    push edi
                                                                                    push esi
                                                                                    mov esi, dword ptr [ebp+0Ch]
                                                                                    mov ecx, dword ptr [ebp+10h]
                                                                                    mov edi, dword ptr [ebp+08h]
                                                                                    mov eax, ecx
                                                                                    mov edx, ecx
                                                                                    add eax, esi
                                                                                    cmp edi, esi
                                                                                    jbe 00007FA0D88218EAh
                                                                                    cmp edi, eax
                                                                                    jc 00007FA0D8821A86h
                                                                                    cmp ecx, 00000080h
                                                                                    jc 00007FA0D88218FEh
                                                                                    cmp dword ptr [004A9724h], 00000000h
                                                                                    je 00007FA0D88218F5h
                                                                                    push edi
                                                                                    push esi
                                                                                    and edi, 0Fh
                                                                                    and esi, 0Fh
                                                                                    cmp edi, esi
                                                                                    pop esi
                                                                                    pop edi
                                                                                    jne 00007FA0D88218E7h
                                                                                    jmp 00007FA0D8821CC2h
                                                                                    test edi, 00000003h
                                                                                    jne 00007FA0D88218F6h
                                                                                    shr ecx, 02h
                                                                                    and edx, 03h
                                                                                    cmp ecx, 08h
                                                                                    jc 00007FA0D882190Bh
                                                                                    rep movsd
                                                                                    jmp dword ptr [00416740h+edx*4]
                                                                                    mov eax, edi
                                                                                    mov edx, 00000003h
                                                                                    sub ecx, 04h
                                                                                    jc 00007FA0D88218EEh
                                                                                    and eax, 03h
                                                                                    add ecx, eax
                                                                                    jmp dword ptr [00416654h+eax*4]
                                                                                    jmp dword ptr [00416750h+ecx*4]
                                                                                    nop
                                                                                    jmp dword ptr [004166D4h+ecx*4]
                                                                                    nop
                                                                                    inc cx
                                                                                    add byte ptr [eax-4BFFBE9Ah], dl
                                                                                    inc cx
                                                                                    add byte ptr [ebx], ah
                                                                                    ror dword ptr [edx-75F877FAh], 1
                                                                                    inc esi
                                                                                    add dword ptr [eax+468A0147h], ecx
                                                                                    add al, cl
                                                                                    jmp 00007FA0DAC9A0E7h
                                                                                    add esi, 03h
                                                                                    add edi, 03h
                                                                                    cmp ecx, 08h
                                                                                    jc 00007FA0D88218AEh
                                                                                    rep movsd
                                                                                    jmp dword ptr [00000000h+edx*4]
                                                                                    Programming Language:
                                                                                    • [ C ] VS2010 SP1 build 40219
                                                                                    • [C++] VS2010 SP1 build 40219
                                                                                    • [ C ] VS2008 SP1 build 30729
                                                                                    • [IMP] VS2008 SP1 build 30729
                                                                                    • [ASM] VS2010 SP1 build 40219
                                                                                    • [RES] VS2010 SP1 build 40219
                                                                                    • [LNK] VS2010 SP1 build 40219
                                                                                    NameVirtual AddressVirtual Size Is in Section
                                                                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x8d41c0x154.rdata
                                                                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0xab0000x9328.rsrc
                                                                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_IAT0x820000x844.rdata
                                                                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                    .text0x10000x8061c0x8080061ffce4768976fa0dd2a8f6a97b1417aFalse0.5583182605787937data6.684690148171278IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                    .rdata0x820000xdfc00xe0000354bc5f2376b5e9a4a3ba38b682dff1False0.36085728236607145data4.799741132252136IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                    .data0x900000x1a7580x68008033f5a38941b4685bc2299e78f31221False0.15324519230769232data2.1500715391677487IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                    .rsrc0xab0000x93280x9400495451d7eb8326bd9fa2714869ea6de8False0.49002322635135137data5.541804843154628IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                    RT_ICON0xab5c80x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                                                                                    RT_ICON0xab6f00x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                                                                                    RT_ICON0xab8180x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                                                                    RT_ICON0xab9400x668Device independent bitmap graphic, 48 x 96 x 4, image size 1152EnglishGreat Britain0.48109756097560974
                                                                                    RT_ICON0xabfa80x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 512EnglishGreat Britain0.5672043010752689
                                                                                    RT_ICON0xac2900x128Device independent bitmap graphic, 16 x 32 x 4, image size 128EnglishGreat Britain0.6418918918918919
                                                                                    RT_ICON0xac3b80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsEnglishGreat Britain0.7044243070362474
                                                                                    RT_ICON0xad2600x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsEnglishGreat Britain0.8077617328519856
                                                                                    RT_ICON0xadb080x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsEnglishGreat Britain0.5903179190751445
                                                                                    RT_ICON0xae0700x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishGreat Britain0.5503112033195021
                                                                                    RT_ICON0xb06180x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishGreat Britain0.6050656660412758
                                                                                    RT_ICON0xb16c00x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishGreat Britain0.7553191489361702
                                                                                    RT_MENU0xb1b280x50dataEnglishGreat Britain0.9
                                                                                    RT_DIALOG0xb1b780xfcdataEnglishGreat Britain0.6507936507936508
                                                                                    RT_STRING0xb1c780x530dataEnglishGreat Britain0.33960843373493976
                                                                                    RT_STRING0xb21a80x690dataEnglishGreat Britain0.26964285714285713
                                                                                    RT_STRING0xb28380x4d0dataEnglishGreat Britain0.36363636363636365
                                                                                    RT_STRING0xb2d080x5fcdataEnglishGreat Britain0.3087467362924282
                                                                                    RT_STRING0xb33080x65cdataEnglishGreat Britain0.34336609336609336
                                                                                    RT_STRING0xb39680x388dataEnglishGreat Britain0.377212389380531
                                                                                    RT_STRING0xb3cf00x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishUnited States0.502906976744186
                                                                                    RT_GROUP_ICON0xb3e480x84dataEnglishGreat Britain0.6439393939393939
                                                                                    RT_GROUP_ICON0xb3ed00x14dataEnglishGreat Britain1.15
                                                                                    RT_GROUP_ICON0xb3ee80x14dataEnglishGreat Britain1.25
                                                                                    RT_GROUP_ICON0xb3f000x14dataEnglishGreat Britain1.25
                                                                                    RT_VERSION0xb3f180x19cdataEnglishGreat Britain0.5339805825242718
                                                                                    RT_MANIFEST0xb40b80x26cASCII text, with CRLF line terminatorsEnglishUnited States0.5145161290322581
                                                                                    DLLImport
                                                                                    WSOCK32.dll__WSAFDIsSet, setsockopt, ntohs, recvfrom, sendto, htons, select, listen, WSAStartup, bind, closesocket, connect, socket, send, WSACleanup, ioctlsocket, accept, WSAGetLastError, inet_addr, gethostbyname, gethostname, recv
                                                                                    VERSION.dllVerQueryValueW, GetFileVersionInfoW, GetFileVersionInfoSizeW
                                                                                    WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                                                                                    COMCTL32.dllImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, ImageList_ReplaceIcon, ImageList_Create, InitCommonControlsEx, ImageList_Destroy
                                                                                    MPR.dllWNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W, WNetUseConnectionW
                                                                                    WININET.dllInternetReadFile, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetConnectW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetQueryOptionW, InternetQueryDataAvailable
                                                                                    PSAPI.DLLEnumProcesses, GetModuleBaseNameW, GetProcessMemoryInfo, EnumProcessModules
                                                                                    USERENV.dllCreateEnvironmentBlock, DestroyEnvironmentBlock, UnloadUserProfile, LoadUserProfileW
                                                                                    KERNEL32.dllHeapAlloc, Sleep, GetCurrentThreadId, RaiseException, MulDiv, GetVersionExW, GetSystemInfo, InterlockedIncrement, InterlockedDecrement, WideCharToMultiByte, lstrcpyW, MultiByteToWideChar, lstrlenW, lstrcmpiW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, DeleteFileW, FindNextFileW, MoveFileW, CopyFileW, CreateDirectoryW, RemoveDirectoryW, GetProcessHeap, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, OutputDebugStringW, GetLocalTime, CompareStringW, DeleteCriticalSection, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSectionAndSpinCount, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, GetTempPathW, GetTempFileNameW, VirtualFree, FormatMessageW, GetExitCodeProcess, SetErrorMode, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, DeviceIoControl, SetFileAttributesW, GetShortPathNameW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetCurrentThread, GetProcessIoCounters, CreateProcessW, SetPriorityClass, LoadLibraryW, VirtualAlloc, LoadLibraryExW, HeapFree, WaitForSingleObject, CreateThread, DuplicateHandle, GetLastError, CloseHandle, GetCurrentProcess, GetProcAddress, LoadLibraryA, FreeLibrary, GetModuleFileNameW, GetFullPathNameW, SetCurrentDirectoryW, IsDebuggerPresent, GetCurrentDirectoryW, ExitProcess, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetTimeFormatW, GetDateFormatW, GetCommandLineW, GetStartupInfoW, IsProcessorFeaturePresent, HeapSize, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetStringTypeW, HeapCreate, SetHandleCount, GetFileType, SetStdHandle, GetConsoleCP, GetConsoleMode, LCMapStringW, RtlUnwind, SetFilePointer, GetTimeZoneInformation, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetTickCount, HeapReAlloc, WriteConsoleW, SetEndOfFile, SetSystemPowerState, SetEnvironmentVariableA
                                                                                    USER32.dllGetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, ReleaseCapture, SetCapture, WindowFromPoint, LoadImageW, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, DeleteMenu, CheckMenuRadioItem, SetWindowPos, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, SystemParametersInfoW, TranslateMessage, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, AttachThreadInput, GetFocus, GetWindowTextW, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, GetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, MessageBoxW, DefWindowProcW, CopyImage, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, GetMenuItemID, DispatchMessageW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, PeekMessageW, UnregisterHotKey, CharLowerBuffW, keybd_event, MonitorFromRect, GetWindowThreadProcessId
                                                                                    GDI32.dllDeleteObject, AngleArc, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, StrokePath, EndPath, SetPixel, CloseFigure, CreateCompatibleBitmap, CreateCompatibleDC, SelectObject, StretchBlt, GetDIBits, GetDeviceCaps, MoveToEx, DeleteDC, GetPixel, CreateDCW, Ellipse, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, GetStockObject, LineTo
                                                                                    COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
                                                                                    ADVAPI32.dllRegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegCreateKeyExW, GetUserNameW, RegConnectRegistryW, CloseServiceHandle, UnlockServiceDatabase, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, InitializeSecurityDescriptor, InitializeAcl, GetLengthSid, CopySid, LogonUserW, LockServiceDatabase, GetTokenInformation, GetSecurityDescriptorDacl, GetAclInformation, GetAce, AddAce, SetSecurityDescriptorDacl, RegOpenKeyExW, RegQueryValueExW, AdjustTokenPrivileges, InitiateSystemShutdownExW, OpenSCManagerW, RegCloseKey
                                                                                    SHELL32.dllDragQueryPoint, ShellExecuteExW, SHGetFolderPathW, DragQueryFileW, SHEmptyRecycleBinW, SHBrowseForFolderW, SHFileOperationW, SHGetPathFromIDListW, SHGetDesktopFolder, SHGetMalloc, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
                                                                                    ole32.dllOleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CLSIDFromString, StringFromGUID2, CoInitialize, CoUninitialize, CoCreateInstance, CreateStreamOnHGlobal, CoTaskMemAlloc, CoTaskMemFree, ProgIDFromCLSID, OleInitialize, CreateBindCtx, CLSIDFromProgID, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket, OleUninitialize, IIDFromString
                                                                                    OLEAUT32.dllVariantChangeType, VariantCopyInd, DispCallFunc, CreateStdDispatch, CreateDispTypeInfo, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, SysStringLen, SafeArrayAllocData, GetActiveObject, QueryPathOfRegTypeLib, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, SysAllocString, VariantCopy, VariantClear, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, OleLoadPicture, SafeArrayAccessData, VariantInit
                                                                                    DescriptionData
                                                                                    FileDescription
                                                                                    FileVersion3, 3, 8, 1
                                                                                    CompiledScriptAutoIt v3 Script: 3, 3, 8, 1
                                                                                    Translation0x0809 0x04b0
                                                                                    Language of compilation systemCountry where language is spokenMap
                                                                                    EnglishGreat Britain
                                                                                    EnglishUnited States
                                                                                    TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                    2025-03-07T22:13:48.432256+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.549695132.226.247.7380TCP
                                                                                    2025-03-07T22:13:57.604075+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.549695132.226.247.7380TCP
                                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                                    Mar 7, 2025 22:13:47.475976944 CET4969580192.168.2.5132.226.247.73
                                                                                    Mar 7, 2025 22:13:47.481070995 CET8049695132.226.247.73192.168.2.5
                                                                                    Mar 7, 2025 22:13:47.481260061 CET4969580192.168.2.5132.226.247.73
                                                                                    Mar 7, 2025 22:13:47.481545925 CET4969580192.168.2.5132.226.247.73
                                                                                    Mar 7, 2025 22:13:47.486589909 CET8049695132.226.247.73192.168.2.5
                                                                                    Mar 7, 2025 22:13:48.163207054 CET8049695132.226.247.73192.168.2.5
                                                                                    Mar 7, 2025 22:13:48.167109966 CET4969580192.168.2.5132.226.247.73
                                                                                    Mar 7, 2025 22:13:48.172267914 CET8049695132.226.247.73192.168.2.5
                                                                                    Mar 7, 2025 22:13:48.375077009 CET8049695132.226.247.73192.168.2.5
                                                                                    Mar 7, 2025 22:13:48.390475035 CET49696443192.168.2.5104.21.16.1
                                                                                    Mar 7, 2025 22:13:48.390563965 CET44349696104.21.16.1192.168.2.5
                                                                                    Mar 7, 2025 22:13:48.390654087 CET49696443192.168.2.5104.21.16.1
                                                                                    Mar 7, 2025 22:13:48.397408009 CET49696443192.168.2.5104.21.16.1
                                                                                    Mar 7, 2025 22:13:48.397443056 CET44349696104.21.16.1192.168.2.5
                                                                                    Mar 7, 2025 22:13:48.432255983 CET4969580192.168.2.5132.226.247.73
                                                                                    Mar 7, 2025 22:13:51.057156086 CET44349696104.21.16.1192.168.2.5
                                                                                    Mar 7, 2025 22:13:51.057226896 CET49696443192.168.2.5104.21.16.1
                                                                                    Mar 7, 2025 22:13:51.062268019 CET49696443192.168.2.5104.21.16.1
                                                                                    Mar 7, 2025 22:13:51.062279940 CET44349696104.21.16.1192.168.2.5
                                                                                    Mar 7, 2025 22:13:51.062606096 CET44349696104.21.16.1192.168.2.5
                                                                                    Mar 7, 2025 22:13:51.104065895 CET49696443192.168.2.5104.21.16.1
                                                                                    Mar 7, 2025 22:13:51.105880976 CET49696443192.168.2.5104.21.16.1
                                                                                    Mar 7, 2025 22:13:51.152321100 CET44349696104.21.16.1192.168.2.5
                                                                                    Mar 7, 2025 22:13:51.745806932 CET44349696104.21.16.1192.168.2.5
                                                                                    Mar 7, 2025 22:13:51.745986938 CET44349696104.21.16.1192.168.2.5
                                                                                    Mar 7, 2025 22:13:51.746074915 CET49696443192.168.2.5104.21.16.1
                                                                                    Mar 7, 2025 22:13:51.753473997 CET49696443192.168.2.5104.21.16.1
                                                                                    Mar 7, 2025 22:13:57.342660904 CET4969580192.168.2.5132.226.247.73
                                                                                    Mar 7, 2025 22:13:57.347753048 CET8049695132.226.247.73192.168.2.5
                                                                                    Mar 7, 2025 22:13:57.553792000 CET8049695132.226.247.73192.168.2.5
                                                                                    Mar 7, 2025 22:13:57.604074955 CET4969580192.168.2.5132.226.247.73
                                                                                    Mar 7, 2025 22:13:58.062886000 CET49697587192.168.2.5198.59.144.139
                                                                                    Mar 7, 2025 22:13:58.067989111 CET58749697198.59.144.139192.168.2.5
                                                                                    Mar 7, 2025 22:13:58.068130016 CET49697587192.168.2.5198.59.144.139
                                                                                    Mar 7, 2025 22:13:58.646527052 CET58749697198.59.144.139192.168.2.5
                                                                                    Mar 7, 2025 22:13:58.668946981 CET49697587192.168.2.5198.59.144.139
                                                                                    Mar 7, 2025 22:13:58.674045086 CET58749697198.59.144.139192.168.2.5
                                                                                    Mar 7, 2025 22:13:58.806878090 CET58749697198.59.144.139192.168.2.5
                                                                                    Mar 7, 2025 22:13:58.849420071 CET49697587192.168.2.5198.59.144.139
                                                                                    Mar 7, 2025 22:13:58.854592085 CET58749697198.59.144.139192.168.2.5
                                                                                    Mar 7, 2025 22:13:58.988398075 CET58749697198.59.144.139192.168.2.5
                                                                                    Mar 7, 2025 22:13:58.989329100 CET49697587192.168.2.5198.59.144.139
                                                                                    Mar 7, 2025 22:13:58.994400024 CET58749697198.59.144.139192.168.2.5
                                                                                    Mar 7, 2025 22:13:59.144728899 CET58749697198.59.144.139192.168.2.5
                                                                                    Mar 7, 2025 22:13:59.144746065 CET58749697198.59.144.139192.168.2.5
                                                                                    Mar 7, 2025 22:13:59.144757032 CET58749697198.59.144.139192.168.2.5
                                                                                    Mar 7, 2025 22:13:59.144830942 CET49697587192.168.2.5198.59.144.139
                                                                                    Mar 7, 2025 22:13:59.177700043 CET49697587192.168.2.5198.59.144.139
                                                                                    Mar 7, 2025 22:13:59.182914972 CET58749697198.59.144.139192.168.2.5
                                                                                    Mar 7, 2025 22:13:59.314831018 CET58749697198.59.144.139192.168.2.5
                                                                                    Mar 7, 2025 22:13:59.318135977 CET49697587192.168.2.5198.59.144.139
                                                                                    Mar 7, 2025 22:13:59.323251963 CET58749697198.59.144.139192.168.2.5
                                                                                    Mar 7, 2025 22:13:59.455163956 CET58749697198.59.144.139192.168.2.5
                                                                                    Mar 7, 2025 22:13:59.456279993 CET49697587192.168.2.5198.59.144.139
                                                                                    Mar 7, 2025 22:13:59.461419106 CET58749697198.59.144.139192.168.2.5
                                                                                    Mar 7, 2025 22:13:59.593523979 CET58749697198.59.144.139192.168.2.5
                                                                                    Mar 7, 2025 22:13:59.594819069 CET49697587192.168.2.5198.59.144.139
                                                                                    Mar 7, 2025 22:13:59.599837065 CET58749697198.59.144.139192.168.2.5
                                                                                    Mar 7, 2025 22:13:59.766954899 CET58749697198.59.144.139192.168.2.5
                                                                                    Mar 7, 2025 22:13:59.767254114 CET49697587192.168.2.5198.59.144.139
                                                                                    Mar 7, 2025 22:13:59.772316933 CET58749697198.59.144.139192.168.2.5
                                                                                    Mar 7, 2025 22:13:59.903814077 CET58749697198.59.144.139192.168.2.5
                                                                                    Mar 7, 2025 22:13:59.904144049 CET49697587192.168.2.5198.59.144.139
                                                                                    Mar 7, 2025 22:13:59.909176111 CET58749697198.59.144.139192.168.2.5
                                                                                    Mar 7, 2025 22:14:00.070619106 CET58749697198.59.144.139192.168.2.5
                                                                                    Mar 7, 2025 22:14:00.070811987 CET49697587192.168.2.5198.59.144.139
                                                                                    Mar 7, 2025 22:14:00.075879097 CET58749697198.59.144.139192.168.2.5
                                                                                    Mar 7, 2025 22:14:00.207189083 CET58749697198.59.144.139192.168.2.5
                                                                                    Mar 7, 2025 22:14:00.211755037 CET49697587192.168.2.5198.59.144.139
                                                                                    Mar 7, 2025 22:14:00.212091923 CET49697587192.168.2.5198.59.144.139
                                                                                    Mar 7, 2025 22:14:00.212091923 CET49697587192.168.2.5198.59.144.139
                                                                                    Mar 7, 2025 22:14:00.212091923 CET49697587192.168.2.5198.59.144.139
                                                                                    Mar 7, 2025 22:14:00.212182999 CET49697587192.168.2.5198.59.144.139
                                                                                    Mar 7, 2025 22:14:00.212260008 CET49697587192.168.2.5198.59.144.139
                                                                                    Mar 7, 2025 22:14:00.212260008 CET49697587192.168.2.5198.59.144.139
                                                                                    Mar 7, 2025 22:14:00.212392092 CET49697587192.168.2.5198.59.144.139
                                                                                    Mar 7, 2025 22:14:00.217529058 CET58749697198.59.144.139192.168.2.5
                                                                                    Mar 7, 2025 22:14:00.218008995 CET58749697198.59.144.139192.168.2.5
                                                                                    Mar 7, 2025 22:14:00.218030930 CET58749697198.59.144.139192.168.2.5
                                                                                    Mar 7, 2025 22:14:00.219127893 CET58749697198.59.144.139192.168.2.5
                                                                                    Mar 7, 2025 22:14:00.219139099 CET58749697198.59.144.139192.168.2.5
                                                                                    Mar 7, 2025 22:14:00.397594929 CET58749697198.59.144.139192.168.2.5
                                                                                    Mar 7, 2025 22:14:00.494776964 CET49697587192.168.2.5198.59.144.139
                                                                                    Mar 7, 2025 22:14:47.573312998 CET4969580192.168.2.5132.226.247.73
                                                                                    Mar 7, 2025 22:14:47.578838110 CET8049695132.226.247.73192.168.2.5
                                                                                    Mar 7, 2025 22:14:47.578958035 CET4969580192.168.2.5132.226.247.73
                                                                                    Mar 7, 2025 22:15:37.589014053 CET49697587192.168.2.5198.59.144.139
                                                                                    Mar 7, 2025 22:15:37.594099998 CET58749697198.59.144.139192.168.2.5
                                                                                    Mar 7, 2025 22:15:37.726352930 CET58749697198.59.144.139192.168.2.5
                                                                                    Mar 7, 2025 22:15:37.732439995 CET49697587192.168.2.5198.59.144.139
                                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                                    Mar 7, 2025 22:13:47.461940050 CET5515253192.168.2.51.1.1.1
                                                                                    Mar 7, 2025 22:13:47.470271111 CET53551521.1.1.1192.168.2.5
                                                                                    Mar 7, 2025 22:13:48.379676104 CET6032553192.168.2.51.1.1.1
                                                                                    Mar 7, 2025 22:13:48.388391972 CET53603251.1.1.1192.168.2.5
                                                                                    Mar 7, 2025 22:13:57.563780069 CET5943253192.168.2.51.1.1.1
                                                                                    Mar 7, 2025 22:13:58.061786890 CET53594321.1.1.1192.168.2.5
                                                                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                    Mar 7, 2025 22:13:47.461940050 CET192.168.2.51.1.1.10x6db6Standard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                                                                    Mar 7, 2025 22:13:48.379676104 CET192.168.2.51.1.1.10xba03Standard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                                                                                    Mar 7, 2025 22:13:57.563780069 CET192.168.2.51.1.1.10xc58bStandard query (0)mail.grupomaya.mxA (IP address)IN (0x0001)false
                                                                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                    Mar 7, 2025 22:13:47.470271111 CET1.1.1.1192.168.2.50x6db6No error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                                                                    Mar 7, 2025 22:13:47.470271111 CET1.1.1.1192.168.2.50x6db6No error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                                                                    Mar 7, 2025 22:13:47.470271111 CET1.1.1.1192.168.2.50x6db6No error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                                                                    Mar 7, 2025 22:13:47.470271111 CET1.1.1.1192.168.2.50x6db6No error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                                                                    Mar 7, 2025 22:13:47.470271111 CET1.1.1.1192.168.2.50x6db6No error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                                                                    Mar 7, 2025 22:13:47.470271111 CET1.1.1.1192.168.2.50x6db6No error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                                                                    Mar 7, 2025 22:13:48.388391972 CET1.1.1.1192.168.2.50xba03No error (0)reallyfreegeoip.org104.21.16.1A (IP address)IN (0x0001)false
                                                                                    Mar 7, 2025 22:13:48.388391972 CET1.1.1.1192.168.2.50xba03No error (0)reallyfreegeoip.org104.21.64.1A (IP address)IN (0x0001)false
                                                                                    Mar 7, 2025 22:13:48.388391972 CET1.1.1.1192.168.2.50xba03No error (0)reallyfreegeoip.org104.21.32.1A (IP address)IN (0x0001)false
                                                                                    Mar 7, 2025 22:13:48.388391972 CET1.1.1.1192.168.2.50xba03No error (0)reallyfreegeoip.org104.21.112.1A (IP address)IN (0x0001)false
                                                                                    Mar 7, 2025 22:13:48.388391972 CET1.1.1.1192.168.2.50xba03No error (0)reallyfreegeoip.org104.21.48.1A (IP address)IN (0x0001)false
                                                                                    Mar 7, 2025 22:13:48.388391972 CET1.1.1.1192.168.2.50xba03No error (0)reallyfreegeoip.org104.21.96.1A (IP address)IN (0x0001)false
                                                                                    Mar 7, 2025 22:13:48.388391972 CET1.1.1.1192.168.2.50xba03No error (0)reallyfreegeoip.org104.21.80.1A (IP address)IN (0x0001)false
                                                                                    Mar 7, 2025 22:13:58.061786890 CET1.1.1.1192.168.2.50xc58bNo error (0)mail.grupomaya.mxgrupomaya.mxCNAME (Canonical name)IN (0x0001)false
                                                                                    Mar 7, 2025 22:13:58.061786890 CET1.1.1.1192.168.2.50xc58bNo error (0)grupomaya.mx198.59.144.139A (IP address)IN (0x0001)false
                                                                                    • reallyfreegeoip.org
                                                                                    • checkip.dyndns.org
                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    0192.168.2.549695132.226.247.73806584C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    Mar 7, 2025 22:13:47.481545925 CET151OUTGET / HTTP/1.1
                                                                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                    Host: checkip.dyndns.org
                                                                                    Connection: Keep-Alive
                                                                                    Mar 7, 2025 22:13:48.163207054 CET273INHTTP/1.1 200 OK
                                                                                    Date: Fri, 07 Mar 2025 21:13:48 GMT
                                                                                    Content-Type: text/html
                                                                                    Content-Length: 104
                                                                                    Connection: keep-alive
                                                                                    Cache-Control: no-cache
                                                                                    Pragma: no-cache
                                                                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                                                                    Mar 7, 2025 22:13:48.167109966 CET127OUTGET / HTTP/1.1
                                                                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                    Host: checkip.dyndns.org
                                                                                    Mar 7, 2025 22:13:48.375077009 CET273INHTTP/1.1 200 OK
                                                                                    Date: Fri, 07 Mar 2025 21:13:48 GMT
                                                                                    Content-Type: text/html
                                                                                    Content-Length: 104
                                                                                    Connection: keep-alive
                                                                                    Cache-Control: no-cache
                                                                                    Pragma: no-cache
                                                                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                                                                    Mar 7, 2025 22:13:57.342660904 CET127OUTGET / HTTP/1.1
                                                                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                    Host: checkip.dyndns.org
                                                                                    Mar 7, 2025 22:13:57.553792000 CET273INHTTP/1.1 200 OK
                                                                                    Date: Fri, 07 Mar 2025 21:13:57 GMT
                                                                                    Content-Type: text/html
                                                                                    Content-Length: 104
                                                                                    Connection: keep-alive
                                                                                    Cache-Control: no-cache
                                                                                    Pragma: no-cache
                                                                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    0192.168.2.549696104.21.16.14436584C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    2025-03-07 21:13:51 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                                    Host: reallyfreegeoip.org
                                                                                    Connection: Keep-Alive
                                                                                    2025-03-07 21:13:51 UTC853INHTTP/1.1 200 OK
                                                                                    Date: Fri, 07 Mar 2025 21:13:51 GMT
                                                                                    Content-Type: text/xml
                                                                                    Content-Length: 362
                                                                                    Connection: close
                                                                                    Age: 11475
                                                                                    Cache-Control: max-age=31536000
                                                                                    cf-cache-status: HIT
                                                                                    last-modified: Fri, 07 Mar 2025 18:02:35 GMT
                                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=jjLfMkEqf0bOo08QWFDtLSyynRfjyOPz9As%2Fn9WrGqYNwzSDsb5XgEkCiXtGaD14n16KG6nAN0MJ9H5QMfd9Jf%2Fh78nuQuZB5HCbwX5MjIer8xMuiAmvx1YJ5Flg5R6ydR3YJcA0"}],"group":"cf-nel","max_age":604800}
                                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                    Server: cloudflare
                                                                                    CF-RAY: 91cd1960de8c091c-LAX
                                                                                    alt-svc: h3=":443"; ma=86400
                                                                                    server-timing: cfL4;desc="?proto=TCP&rtt=11468&min_rtt=11358&rtt_var=3389&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2849&recv_bytes=699&delivery_rate=242240&cwnd=236&unsent_bytes=0&cid=d3a90c404379677b&ts=694&x=0"
                                                                                    2025-03-07 21:13:51 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                                    Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                                    TimestampSource PortDest PortSource IPDest IPCommands
                                                                                    Mar 7, 2025 22:13:58.646527052 CET58749697198.59.144.139192.168.2.5220-svgt326.serverneubox.com.mx ESMTP Exim 4.98.1 #2 Fri, 07 Mar 2025 15:13:58 -0600
                                                                                    220-We do not authorize the use of this system to transport unsolicited,
                                                                                    220 and/or bulk e-mail.
                                                                                    Mar 7, 2025 22:13:58.668946981 CET49697587192.168.2.5198.59.144.139EHLO 287400
                                                                                    Mar 7, 2025 22:13:58.806878090 CET58749697198.59.144.139192.168.2.5250-svgt326.serverneubox.com.mx Hello 287400 [8.46.123.189]
                                                                                    250-SIZE 52428800
                                                                                    250-LIMITS MAILMAX=1000 RCPTMAX=50000
                                                                                    250-8BITMIME
                                                                                    250-PIPELINING
                                                                                    250-PIPECONNECT
                                                                                    250-AUTH PLAIN LOGIN
                                                                                    250-STARTTLS
                                                                                    250 HELP
                                                                                    Mar 7, 2025 22:13:58.849420071 CET49697587192.168.2.5198.59.144.139STARTTLS
                                                                                    Mar 7, 2025 22:13:58.988398075 CET58749697198.59.144.139192.168.2.5220 TLS go ahead

                                                                                    Click to jump to process

                                                                                    Click to jump to process

                                                                                    Click to dive into process behavior distribution

                                                                                    Click to jump to process

                                                                                    Target ID:0
                                                                                    Start time:16:13:43
                                                                                    Start date:07/03/2025
                                                                                    Path:C:\Users\user\Desktop\tSftorqHTy.exe
                                                                                    Wow64 process (32bit):true
                                                                                    Commandline:"C:\Users\user\Desktop\tSftorqHTy.exe"
                                                                                    Imagebase:0x400000
                                                                                    File size:80'740'352 bytes
                                                                                    MD5 hash:C2792411F364989EC0D213A3AB7C4F94
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:C, C++ or other language
                                                                                    Yara matches:
                                                                                    • Rule: JoeSecurity_MassLogger, Description: Yara detected MassLogger RAT, Source: 00000000.00000002.1375265324.0000000000AA0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1375265324.0000000000AA0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                    • Rule: JoeSecurity_MSILLogger, Description: Yara detected MSIL Logger, Source: 00000000.00000002.1375265324.0000000000AA0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                    • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000000.00000002.1375265324.0000000000AA0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                    • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000000.00000002.1375265324.0000000000AA0000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                                                    • Rule: MAL_Envrial_Jan18_1, Description: Detects Encrial credential stealer malware, Source: 00000000.00000002.1375265324.0000000000AA0000.00000004.00001000.00020000.00000000.sdmp, Author: Florian Roth
                                                                                    Reputation:low
                                                                                    Has exited:true

                                                                                    Target ID:2
                                                                                    Start time:16:13:45
                                                                                    Start date:07/03/2025
                                                                                    Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                    Wow64 process (32bit):true
                                                                                    Commandline:"C:\Users\user\Desktop\tSftorqHTy.exe"
                                                                                    Imagebase:0x840000
                                                                                    File size:45'984 bytes
                                                                                    MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:C, C++ or other language
                                                                                    Yara matches:
                                                                                    • Rule: JoeSecurity_MassLogger, Description: Yara detected MassLogger RAT, Source: 00000002.00000002.2594091779.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.2594091779.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                    • Rule: JoeSecurity_MSILLogger, Description: Yara detected MSIL Logger, Source: 00000002.00000002.2594091779.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                    • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000002.00000002.2594091779.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                    • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000002.00000002.2594091779.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
                                                                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.2595080414.0000000002CC6000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                    • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000002.00000002.2595080414.0000000002CC6000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                    Reputation:high
                                                                                    Has exited:false

                                                                                    Reset < >